US7565146B2 - Intercepting a call connection to a mobile subscriber roaming in a visited PLMN (VPLMN) - Google Patents

Intercepting a call connection to a mobile subscriber roaming in a visited PLMN (VPLMN) Download PDF

Info

Publication number
US7565146B2
US7565146B2 US10/495,861 US49586104A US7565146B2 US 7565146 B2 US7565146 B2 US 7565146B2 US 49586104 A US49586104 A US 49586104A US 7565146 B2 US7565146 B2 US 7565146B2
Authority
US
United States
Prior art keywords
network
called terminal
gateway
subscriber
communication networks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US10/495,861
Other versions
US20050027866A1 (en
Inventor
Jorma Seurujärvi
Antti Laurila
Urpo Kärki
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia Technologies Oy
Original Assignee
Nokia Oyj
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nokia Oyj filed Critical Nokia Oyj
Assigned to NOKIA CORPORATION reassignment NOKIA CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: LAURILA, ANTTI, KARKI, URPO, SEURUJARVI, JORMA
Publication of US20050027866A1 publication Critical patent/US20050027866A1/en
Application granted granted Critical
Publication of US7565146B2 publication Critical patent/US7565146B2/en
Assigned to NOKIA TECHNOLOGIES OY reassignment NOKIA TECHNOLOGIES OY ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NOKIA CORPORATION
Adjusted expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/304Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting circuit switched data communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M2207/00Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place
    • H04M2207/18Type of exchange or network, i.e. telephonic medium, in which the telephonic communication takes place wireless networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/16Gateway arrangements

Definitions

  • the present invention relates to a method for intercepting a connection established in a communication network system.
  • the present invention as described later on is not restricted to any type of communication network.
  • GSM communication networks as well as to more developed communication networks, like 3 rd generation networks e.g. UMTS and so called All IP networks utilizing IM multimedia subsystem specified by 3GGP.
  • 3 rd generation networks e.g. UMTS and so called All IP networks utilizing IM multimedia subsystem specified by 3GGP.
  • Those more developed networks are for example described in the 3GPP specifications such as 3GPP TS 23.002 V5.4.0 (2001-10) and 3GPP TS23.228 V5.2.0 (2001-10).
  • a terminal means any user equipment by means of which a user/subscriber to the network may access the network, whether wireless or wirebound.
  • the communication networks may be assumed to have the standardized configuration except for the particularities explained in connection with the present invention. Therefore, a detailed description of the communication network architecture and/or involved functionality of the network entities is considered to be dispensable here as a skilled person may safely be aware of those aspects of communication networks.
  • the subscriber's call interception activation information is stored in the HLR's subscriber database and the HLR updates the call interception activation information in the MSC/VLR.
  • the information is transferred either when the monitoring is activated or when the subscriber performs a location update.
  • the interception information is present in the VLR serving the subscriber to be intercepted and can be activated when VLR detects any activities requiring legal interception.
  • This method of activation is called VLR activation as it is the VLR that is playing the active role in activating interception.
  • the VLR activation described above is the default assumption in GSM networks, and thus the activation of the interception in the cases where the call to the subscriber is to be intercepted, is normally left for the VLR of the called subscriber (B-subscriber).
  • B-subscriber This kind of assumption works fine if the B-subscriber is currently in his home network i.e. in the same network than this HLR is. Then the assumption that the VLR has the activation information is correct.
  • this object is for example achieved by a method for intercepting a connection established in a communication network system between a called terminal and a calling terminal, said network system comprising at least two communication networks having an interface towards each other, said called terminal being registered to a subscriber database entity of one of said communication networks while being located in another one of said communication networks, the method comprising the steps of: initiating a connection establishment from said calling terminal towards said called terminal, requesting, during connection establishment, said subscriber database entity to which said called terminal is registered, for subscriber related information, detecting that said requested information contains an indication that connections to said called subscriber are to be intercepted, and tapping the established connection between the called and calling terminal at the interface between said networks.
  • monitoring of a subscriber can be activated according to information in HLR when this subscriber is roaming outside his or her home network (HPLMN) in another network.
  • HPLMN his or her home network
  • the present invention will offer same functionality with much less signaling.
  • the principle according to the present invention is applicable in GSM (second generation networks) as well as in third generation networks and/or all-IP networks having an all-IP core network and/or IP multimedia subsystem IMS.
  • the advantages are clear, which are obtained by not distributing “tapping information” to each VLR, as it is the case according to prior art arrangements, but by concentrating the “tapping information” in the HLR/HSS. Namely, upon contacting a called subscriber, the HLR/HSS is always queried in order to obtain information about the subscribers' present location, and together with this, an indication as to whether the called subscriber is to be tapped/intercepted or not is obtained from the HLR.
  • FIG. 1 shows a first intercepting scenario according to the present invention
  • FIG. 2 shows a second intercepting scenario according to the present invention
  • FIG. 3 shows a basic network architecture of a UMTSnetwork for outlining that the first and second scenarios are also applicable in case of a UMTS network.
  • a method for intercepting which enables intercepting of a connection established in a communication network system between a called terminal and a calling terminal based on the HLR activation (activation means a “flag” in the HLR identifying that the specific subscriber is to be intercepted).
  • activation means a “flag” in the HLR identifying that the specific subscriber is to be intercepted.
  • the idea is that the HLR inquiry checks also the HLR activation status of a subscriber. If the query contains information that the HLR activation is on (and/or set), then the GMSC starts intercepting the called subscriber.
  • the call/connection is delivered to the GMSC (Gateway Mobile Switching Center) of the B-subscriber's HPLMN. So, the GMSC represents the first contact point and/or access point to the HPLMN where interception can be activated.
  • the call/connection is always routed via the GMSC of B-subscriber regardless of the location of the A-subscriber. That means, the A-subcriber can be inside the HPLMN of B-subscriber or in another network, as shown in FIGS. 1 and 2 , respectively.
  • the monitoring information could be included for example, in the MAP extensions of the response to the MapSendRoutingInformation operation.
  • FIG. 1 shows a first intercepting scenario according to the present invention.
  • the method for intercepting a connection established in a communication network system between a called terminal of subscriber B and a calling terminal of another subscriber A (not necessarily having subscribed to the same communication network as subscriber B has), will subsequently be described with reference thereto.
  • said network system comprises at least two communication networks: a home network of subscriber B, HPLMN of B, and a currently visited network VPLMN, in which the subscriber is located. Both networks have an interface towards each other, as represented by the connection between GMSC 1 (of HPLMN) and GMSC 2 (of VPLMN).
  • the called terminal of subscriber B is registered to a subscriber database entity such as a home location register HLR of a GSM network (or HSS in case of a UMTS network) of one of said communication networks, i.e. the HPLMN of B, while the called subscriber is located in the another one, VPLMN, of said communication networks.
  • HLR Mobile Switching Center MSC 1 of the HPLMN.
  • the HLR may be contacted directly from the MSC 1 , while however in FIG. 1 a situation is illustrated in which the connection establishment signaling is routed from A via MSC 1 , GMSC 1 to the HLR.
  • subscriber related information is requested, during connection establishment, from said subscriber database entity (HLR or HSS) to which said called terminal B is registered.
  • HLR subscriber database entity
  • HSS subscriber database entity
  • the returned information comprise at least an identification of the called subscriber's current location, i.e. in which one of plural visited networks VPLMN he is present. (Note that FIG. 1 shows only one VPLMN to keep the drawings simple).
  • This identification of the VPLMN is used to route the call connection establishment signaling further to the called subscriber via a gateway GMSC 2 and a MSC 2 of the VPLMN to the called subscriber B.
  • Connection means a communication channel between two or more end-points, i.e. A and B in the illustrated scenario.
  • call content is exchanged, i.e. user data such as speech, SMS, packet data or the like.
  • the connection is indicated by a solid line in FIG. 1 .
  • the GMSC Based on the interception flag being detected, the GMSC initiates tapping the established connection between the called B and calling terminal A at the interface between said networks. More precisely, tapping is performed in GMSCl and duplicates of data communicated via the connection (user data as well as related information) are forwarded to delivery functions 2 and 3 (DF 2 /DF 3 ) for further transmission to the law enforcement agencies having requested that subscriber B is to be intercepted.
  • delivery functions 2 and 3 DF 2 /DF 3
  • DF 2 is in charge of delivering IRI (Intercept Related Information)
  • DF 3 is in charge of delivering the Intercept Product IP to the law enforcement agency LEA (not shown in FIG. 1 ).
  • FIG. 2 shows a second intercepting scenario according to the present invention.
  • the calling subscriber and the called subscriber are in the same VPLMN, i.e. not the called subscribers HPLMN.
  • the same entities perform the same functions as explained in connection with FIG. 1 and that the same illustration for signaling/connection and intercepting paths has respectively been chosen.
  • the signaling path for connection establishment is then A ⁇ MSC 21 ⁇ GMSC 2 ⁇ GMSC 1 ⁇ HLR ⁇ GMSC 1 ⁇ GMSC 2 ⁇ MSC 22 ⁇ B.
  • the called subscribers'identification e.g. MSISDN, IMEI or the like
  • the inquiry of the HLR in the HPLMN yields the same information as described in connection with FIG. 1 .
  • connection is then established as follows A ⁇ MSC 21 ⁇ GMSC 2 ⁇ GMSC 1 ⁇ GMSC 2 ⁇ MSC 22 ⁇ B. Also in the scenario in FIG. 2 , interception is performed in GMSC 1 of the HPLMN of subscriber B and the intercepted data are forwarded to DF 2 /DF 3 .
  • subscribers A and B need not to be in the same VPLMN. That is, subscriber B may be in a different VPLMN than the calling subscriber A, if A is not in the HPLMN of B.
  • the communication network is not restricted to be composed of mobile networks such as GSM or UMTS networks. It is also possible that a call to the called subscriber B is originated from a fixed network such as the PSTN or the like.
  • the HLR of GSM corresponds to HSS in UMTS and that GMSC in GSM corresponds to I-CSCF (Interrogating Call State Control Functionality) in UMTS.
  • I-CSCF Interrogating Call State Control Functionality
  • an MSC corresponds also to a CSCF.
  • all entities and interfaces there between as shown in FIG. 3 are well explained in existing and currently developed standards for such networks as for example the standards mentioned before related to UMTS and/or all-IP networks.
  • the present invention relates to a method for intercepting a connection established in a communication network system between a called terminal B and a calling terminal A, said network system comprising at least two communication networks HPLMN, VPLMN having an interface towards each other, said called terminal B being registered to a subscriber database entity HLR, HSS of one of said communication networks HPLMN while being located in another one VPLMN of said communication networks, the method comprising the steps of: initiating a connection establishment from said calling terminal A towards said called terminal B, requesting, during connection establishment, said subscriber database entity HLR, HSS to which said called terminal B is registered, for subscriber related information, detecting that said requested information contains an indication that connections to said called subscriber B are to be intercepted, and tapping the established connection between the called B and calling terminal A at the interface between said networks.

Landscapes

  • Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention relates to a method for intercepting a connection established in a communication network system between a called terminal (B) and a calling terminal (A), said network system comprising at least two communication networks (HPLMN, VPLMN) having an interface towards each other, said called terminal (B) being registered to a subscriber database entity (HLR, HSS) of one of said communication networks (HPLMN) while being located in another one (VPLMN) of said communication networks, the method comprising the steps of: initiating a connection establishment from said calling terminal (A) towards said called terminal (B), requesting, during connection establishment, said subscriber database entity (HLR, HSS) to which said called terminal (B) is registered, for subscriber related information, detecting that said requested information contains an indication that connections to said called subscriber (B) are to be intercepted, and tapping the established connection between the called (B) and calling terminal (A) at the interface between said networks.

Description

FIELD OF THE INVENTION
The present invention relates to a method for intercepting a connection established in a communication network system.
BACKGROUND OF THE INVENTION
With the recent progress of communication networks such as mobile communication networks, facilities have to be provided for in order to intercept calls and/or connections in these networks. By intercepting these calls, law enforcement agencies such as the police or secret services are thus enabled to gather more information about suspicious or even criminal persons and to initiate suitable countermeasures against and/or to prosecute unlawful actions or the like.
It is to be noted that the present invention as described later on is not restricted to any type of communication network. For example, it is applicable to GSM communication networks as well as to more developed communication networks, like 3rd generation networks e.g. UMTS and so called All IP networks utilizing IM multimedia subsystem specified by 3GGP. Those more developed networks are for example described in the 3GPP specifications such as 3GPP TS 23.002 V5.4.0 (2001-10) and 3GPP TS23.228 V5.2.0 (2001-10). Also, a terminal means any user equipment by means of which a user/subscriber to the network may access the network, whether wireless or wirebound.
The communication networks may be assumed to have the standardized configuration except for the particularities explained in connection with the present invention. Therefore, a detailed description of the communication network architecture and/or involved functionality of the network entities is considered to be dispensable here as a skilled person may safely be aware of those aspects of communication networks.
Also, a detailed introduction to interception, i.e. lawful interception as such and the involved authorities and entities is considered to be known to skilled persons. For example, Kari Miettinen of the Department of Computer Science, University of Helsinki, Finland, has given a rather comprehensive overview over “Lawful Interception in GPRS/UMTS Network”, May 7, 1999. Although focusing on GPRS particularities in interception, the basic concepts as outlined in detail in chapter 2 still hold for the framework of the present invention. This means that the definitions of general principles (chapter 2.1.), standardized environment (chapter 2.2.), and parties and roles (chapter 2.3.) to a large extent can be applied to the present invention, so that a detailed description thereof can be omitted from the present specification.
In the currently existing implementation of legal interception the subscriber's call interception activation information is stored in the HLR's subscriber database and the HLR updates the call interception activation information in the MSC/VLR. The information is transferred either when the monitoring is activated or when the subscriber performs a location update. This way the interception information is present in the VLR serving the subscriber to be intercepted and can be activated when VLR detects any activities requiring legal interception. This method of activation is called VLR activation as it is the VLR that is playing the active role in activating interception.
The VLR activation described above is the default assumption in GSM networks, and thus the activation of the interception in the cases where the call to the subscriber is to be intercepted, is normally left for the VLR of the called subscriber (B-subscriber). This kind of assumption works fine if the B-subscriber is currently in his home network i.e. in the same network than this HLR is. Then the assumption that the VLR has the activation information is correct.
In the case where the B-subscriber to be intercepted is roaming in another network, this assumption that the VLR currently serving the B-subscriber knows the activation is no longer correct. Due to, for example, legal reasons information about the interception is not transferred from one network to another. Thus, the VLR currently serving the B-subscriber roaming in a different network can not activate the interception.
Due the above mentioned reason, in the currently existing implementation of GMSCs representing an access entity to a network constituting part of an interface to/from the network to e.g. another network, roaming subscribers cannot be intercepted according to VLR activation. Previously, the problem was solved so that the activations were set to a local database in a VLR of GMSC. When a new call was established via the GMSC the subscriber was searched from the local database in GMSC and interception was started according to the database. This type of solution required each GMSC to be informed about each subscriber marked to be intercepted and currently roaming in another network. As it is typical that each MSC also functions as a GMSC, this means that the information should be distributed to all MSC/VLR's in the network.
Stated in other words, in GSM networks the identity of a subscriber roaming in another network whose calls are to be legally intercepted has to be included in all VLR's. This results in a need to distribute a large amount of “intercepted target”—data in the network as each VLR has to be informed of the subscriber (i.e. his identity such as MSISDN or IMEI) to be intercepted, even if he is not present in the area of the VLR. Network operators have identified this as representing quite a drawback.
SUMMARY OF THE INVENTION
Hence, it is an object of the present invention to provide a method for intercepting a connection established in a communication network system which is free from the above drawback.
According to the present invention, this object is for example achieved by a method for intercepting a connection established in a communication network system between a called terminal and a calling terminal, said network system comprising at least two communication networks having an interface towards each other, said called terminal being registered to a subscriber database entity of one of said communication networks while being located in another one of said communication networks, the method comprising the steps of: initiating a connection establishment from said calling terminal towards said called terminal, requesting, during connection establishment, said subscriber database entity to which said called terminal is registered, for subscriber related information, detecting that said requested information contains an indication that connections to said called subscriber are to be intercepted, and tapping the established connection between the called and calling terminal at the interface between said networks.
According to advantageous further developments
    • said interface is constituted by gateway functionalities representing an access point to a respective network,
    • tapping is performed at the gateway functionality of said communication network in the subscriber database entity of which the called terminal is registered,
    • tapped information included in said connection is forwarded from said gateway functionality to delivery functionalities,
    • said communication networks are GSM networks and said subscriber database entity is a Home Location Register,
    • said communication networks are GSM networks and said gateway functionalities are Gateway Mobile Switching Centers,
    • said communication networks are third generation mobile communication networks,
    • said communication networks are packet switched communication networks,
    • said packet switched communication networks are Internet Protocol based communication networks,
    • said gateway functionalities are Call State Control Functionalities,
    • said subscriber database entity is a Home Subscriber Server.
Thus, by virtue of the present invention being implemented, monitoring of a subscriber can be activated according to information in HLR when this subscriber is roaming outside his or her home network (HPLMN) in another network. Also, in huge networks as they are currently developing, it's easier to set interception activation to the HLR than to every GMSC locally. Further, compared to prior art solution (identities stored in all VLRs) the present invention will offer same functionality with much less signaling. The principle according to the present invention is applicable in GSM (second generation networks) as well as in third generation networks and/or all-IP networks having an all-IP core network and/or IP multimedia subsystem IMS.
Thus, the advantages are clear, which are obtained by not distributing “tapping information” to each VLR, as it is the case according to prior art arrangements, but by concentrating the “tapping information” in the HLR/HSS. Namely, upon contacting a called subscriber, the HLR/HSS is always queried in order to obtain information about the subscribers' present location, and together with this, an indication as to whether the called subscriber is to be tapped/intercepted or not is obtained from the HLR.
BRIEF DESCRIPTION OF THE DRAWINGS
The present invention and its features, characteristics and advantages will subsequently be described in greater detail with reference to the accompanying drawings, in which
FIG. 1 shows a first intercepting scenario according to the present invention,
FIG. 2 shows a second intercepting scenario according to the present invention, and
FIG. 3 shows a basic network architecture of a UMTSnetwork for outlining that the first and second scenarios are also applicable in case of a UMTS network.
DETAILED DESCRIPTION OF THE EMBODIMENTS
According to the present invention, a method for intercepting is presented which enables intercepting of a connection established in a communication network system between a called terminal and a calling terminal based on the HLR activation (activation means a “flag” in the HLR identifying that the specific subscriber is to be intercepted). The idea is that the HLR inquiry checks also the HLR activation status of a subscriber. If the query contains information that the HLR activation is on (and/or set), then the GMSC starts intercepting the called subscriber.
Stated in other words, when somebody (A-subscriber) calls another subscriber (B-subscriber) who is roaming outside his HPLMN (Home Public Land Mobile Network) the call/connection is delivered to the GMSC (Gateway Mobile Switching Center) of the B-subscriber's HPLMN. So, the GMSC represents the first contact point and/or access point to the HPLMN where interception can be activated. The call/connection is always routed via the GMSC of B-subscriber regardless of the location of the A-subscriber. That means, the A-subcriber can be inside the HPLMN of B-subscriber or in another network, as shown in FIGS. 1 and 2, respectively.
The GMSC of HPLMN performs always a HLR query. If the HLR sends the monitoring information (i.e. indication that the subscriber terminal to which the query is related is to be intercepted, e.g. “activation”=YES), and if the target of interception, i.e. the called B-subscriber, is roaming in another network than his home network HPLMN the GMSC starts monitoring/intercepting the call connection. The monitoring information could be included for example, in the MAP extensions of the response to the MapSendRoutingInformation operation.
In detail, FIG. 1 shows a first intercepting scenario according to the present invention. The method for intercepting a connection established in a communication network system between a called terminal of subscriber B and a calling terminal of another subscriber A (not necessarily having subscribed to the same communication network as subscriber B has), will subsequently be described with reference thereto.
As illustrated, said network system comprises at least two communication networks: a home network of subscriber B, HPLMN of B, and a currently visited network VPLMN, in which the subscriber is located. Both networks have an interface towards each other, as represented by the connection between GMSC1 (of HPLMN) and GMSC2 (of VPLMN). The called terminal of subscriber B is registered to a subscriber database entity such as a home location register HLR of a GSM network (or HSS in case of a UMTS network) of one of said communication networks, i.e. the HPLMN of B, while the called subscriber is located in the another one, VPLMN, of said communication networks.
When subscriber A (located in the HPLMN in FIG. 1) initiates a connection establishment from his calling terminal A towards the called terminal B, he or she contacts the HLR via at least a Mobile Switching Center MSC1 of the HPLMN. The HLR may be contacted directly from the MSC1, while however in FIG. 1 a situation is illustrated in which the connection establishment signaling is routed from A via MSC1, GMSC1 to the HLR.
Based on the called subscriber's, i.e. B's, identity (represented by e.g. its MSISDN (Mobile Station ISDN number) or IMEI (International Mobile Equipment Identity) or any other suitable identification item for identifying the called terminal among the terminals in the network), subscriber related information is requested, during connection establishment, from said subscriber database entity (HLR or HSS) to which said called terminal B is registered. The HLR (or HSS) returns the subscriber related information to the gateway entity GMSC1.
The returned information comprise at least an identification of the called subscriber's current location, i.e. in which one of plural visited networks VPLMN he is present. (Note that FIG. 1 shows only one VPLMN to keep the drawings simple). This identification of the VPLMN is used to route the call connection establishment signaling further to the called subscriber via a gateway GMSC2 and a MSC2 of the VPLMN to the called subscriber B. In addition, the returned information enables detecting at the GMSC1 that said requested information about the called subscriber contains an indication that connections to said called subscriber B are to be intercepted. Stated in other words, the GMSC detects whether an interception flag is set (“activation”=YES) for the called subscriber in the HLR.
Based on the signaling (shown as a dotted line in FIG. 1) the connection between terminals A and B has meanwhile been established. Connection means a communication channel between two or more end-points, i.e. A and B in the illustrated scenario. Via the connection, call content is exchanged, i.e. user data such as speech, SMS, packet data or the like. The connection is indicated by a solid line in FIG. 1.
Based on the interception flag being detected, the GMSC initiates tapping the established connection between the called B and calling terminal A at the interface between said networks. More precisely, tapping is performed in GMSCl and duplicates of data communicated via the connection (user data as well as related information) are forwarded to delivery functions 2 and 3 (DF2/DF3) for further transmission to the law enforcement agencies having requested that subscriber B is to be intercepted. Note that DF2 is in charge of delivering IRI (Intercept Related Information) while DF3 is in charge of delivering the Intercept Product IP to the law enforcement agency LEA (not shown in FIG. 1).
FIG. 2 shows a second intercepting scenario according to the present invention. According to FIG. 2, the calling subscriber and the called subscriber are in the same VPLMN, i.e. not the called subscribers HPLMN. Note that the same entities perform the same functions as explained in connection with FIG. 1 and that the same illustration for signaling/connection and intercepting paths has respectively been chosen.
The signaling path for connection establishment is then A→MSC21→GMSC2→GMSC1→HLR→GMSC1→GMSC2→MSC22→B. Note that based on the called subscribers'identification (e.g. MSISDN, IMEI or the like) it is determined by the network entities of the VPLMN that the called subscriber is a “foreign” subscriber not registered in the HLR (not shown) of the VPLMN so that the HPLMN of subscriber B is known to be required to be contacted. The inquiry of the HLR in the HPLMN yields the same information as described in connection with FIG. 1. The connection is then established as follows A→MSC21→GMSC2→GMSC1→GMSC2→MSC22→B. Also in the scenario in FIG. 2, interception is performed in GMSC1 of the HPLMN of subscriber B and the intercepted data are forwarded to DF2/DF3.
It is to be noted that also subscribers A and B need not to be in the same VPLMN. That is, subscriber B may be in a different VPLMN than the calling subscriber A, if A is not in the HPLMN of B. Also, the communication network is not restricted to be composed of mobile networks such as GSM or UMTS networks. It is also possible that a call to the called subscriber B is originated from a fixed network such as the PSTN or the like.
FIG. 3 shows a basic network architecture of a future packet switched network such as an all-IP (IP=Internet Protocol) based network comprising an all-IP core network (CN) and/or an IP multimedia subsystem IMS for outlining that the first and second scenarios are also applicable in case of such a non-GSM network. Since the scenarios are mutatis mutandis applicable to the UMTS or an all-IP core network (CN) and/or an IP multimedia subsystem IMS network architecture, a repeated description is considered to be dispensable. It is to be noted that the HLR of GSM corresponds to HSS in UMTS and that GMSC in GSM corresponds to I-CSCF (Interrogating Call State Control Functionality) in UMTS. Of course, an MSC corresponds also to a CSCF. Nevertheless, all entities and interfaces there between as shown in FIG. 3 are well explained in existing and currently developed standards for such networks as for example the standards mentioned before related to UMTS and/or all-IP networks.
Accordingly, as has been described herein above, the present invention relates to a method for intercepting a connection established in a communication network system between a called terminal B and a calling terminal A, said network system comprising at least two communication networks HPLMN, VPLMN having an interface towards each other, said called terminal B being registered to a subscriber database entity HLR, HSS of one of said communication networks HPLMN while being located in another one VPLMN of said communication networks, the method comprising the steps of: initiating a connection establishment from said calling terminal A towards said called terminal B, requesting, during connection establishment, said subscriber database entity HLR, HSS to which said called terminal B is registered, for subscriber related information, detecting that said requested information contains an indication that connections to said called subscriber B are to be intercepted, and tapping the established connection between the called B and calling terminal A at the interface between said networks.
Although the present invention has been described herein above with reference to its preferred embodiments, it should be understood that numerous modifications may be made thereto without departing from the spirit and scope of the invention. It is intended that all such modifications fall within the scope of the appended claims.

Claims (30)

1. A method, comprising:
initiating a connection establishment between a calling terminal and a called terminal,
requesting, during connection establishment, a subscriber database of a first mobile network, to provide subscriber related information for the called terminal, the first mobile network being a home mobile communication network of the called terminal,
detecting that both the called terminal and the calling terminal are located in a second mobile communication network visited by the roaming called terminal;
detecting that said requested information contains an indication that connections to said called terminal are to be intercepted;
establishing the connection from the calling terminal via a gateway functionality of the second network to a gateway functionality of the first network, back to the gateway functionality of the second network and further to the called terminal; and
tapping the established connection between the called and calling terminal at the gateway functionality of the first network,
said tapping comprising forwarding duplicates of the intercepted data.
2. A method according to claim 1, wherein
said interface is constituted by gateway functionalities representing an access point to a respective network.
3. A method according to claim 1, wherein
tapping is performed via a gateway functionality of a gateway of said first communication network.
4. A method according to claim 3, wherein
tapped information included in said connection is forwarded from said gateway functionality to delivery functionalities.
5. A method according to claim 1, wherein
said communication networks are global system for mobile communication networks and said subscriber database is a home location register.
6. A method according to claim 2, wherein
said communication networks are global system for mobile communication networks and said gateway functionalities are gateway mobile switching centers.
7. A method according to claim 1, wherein
said communication networks are third generation mobile communication networks.
8. A method according to claim 1, wherein
said communication networks are packet switched communication networks.
9. A method according to claim 8, wherein
said packet switched communication networks are internet protocol based communication networks.
10. A method according to claim 2, wherein
said gateway functionalities are call state control functionalities.
11. A method according to claim 7, wherein
said subscriber database is a home subscriber server.
12. An apparatus, comprising:
an initiator configured to initiate a connection establishment between a calling terminal and a called terminal;
a requester configured to request, during connection establishment, a subscriber database of a home communication network of the called terminal, to provide subscriber related information for the called terminal,
a detector for detecting that both the called terminal and the calling terminal are located in a second communication network visited by the roaming called terminal;
a detector configured to detect that said requested information contains an indication that connections to said called terminal are to be intercepted;
an establisher configured to establish the connection from the calling terminal via a gateway functionality of the second network to a gateway functionality of the first network, back to the gateway functionality of the second network and further to the called terminal; and
a tapper configured to tap the established connection between the called and calling terminal at the gateway functionality of the first network, the tapper being further configured to duplicate intercepted data.
13. An apparatus, comprising:
initiating means for initiating a connection establishment between a calling terminal towards a called terminal;
requesting means for requesting, during connection establishment, a subscriber database of a first mobile network, to provide subscriber related information for said called terminal, the first mobile network being a home communication network of the called terminal,
detecting means for detecting that both the called terminal and the calling terminal are located in a second mobile communication network visited by the roaming called terminal;
detecting means for detecting that said requested information contains an indication that connections to said called terminal are to be intercepted;
establishing means for establishing the connection from the calling terminal via a gateway functionality of the second network to a gateway functionality of the first network, back to the gateway functionality of the second network and further to the called terminal; and
tapping means for tapping the established connection between the called and calling terminal at the gateway functionality of the first network,
the tapping means being configured to duplicate intercepted data.
14. A system, comprising
an interface towards at least one other communication network,
a subscriber database to which at least a called subscriber terminal can be registered,
an initiator adapted to initiate a connection establishment from a calling terminal towards said called terminal,
a requestor configured to request, during connection establishment, said subscriber database to which said called terminal is registered, for subscriber related information,
detector configured to detect that said requested information contains an indication that connections to said called subscriber are to be intercepted,
an establisher configured to establish the connection from the calling terminal via a gateway functionality of the second network to a gateway functionality of the first network, back to the gateway functionality of the second network and further to the called terminal;
a tapper configured to tap the established connection between the called terminal and the calling terminal at the interface,
wherein said interface is constituted by a gateway functionality representing an access point to the network, and
wherein the tapper is located at the gateway functionality of a home network of the called terminal.
15. The apparatus according to claim 12, being configured to forward tapped information included in said connection from said gateway functionality to delivery functionalities.
16. An apparatus system according to claim 12, wherein
at least one of said networks is a global system for mobile communications network, and said subscriber database is a home location register.
17. An apparatus according to claim 12, wherein
said network is a global system for mobile communications network and said gateway functionality is a gateway mobile switching center.
18. An apparatus according to claim 12, wherein
said at least one of the networks is a third generation mobile communication network, a packet switched communication network, or an internet protocol based communication network.
19. An apparatus according to claim 12, wherein said gateway functionality is a call state control functionality.
20. An apparatus according to claim 12, wherein said subscriber database is a home subscriber server.
21. The apparatus according to claim 12, wherein said interface is constituted by gateway functionalities representing an access point to a respective network.
22. The apparatus according to claim 12, wherein the tapper is configured to tap via a gateway functionality of a gateway of said first communication network in the subscriber database of which the called terminal is registered.
23. The apparatus according to claim 21, wherein the tapper is configured to forward tapped data included in said connection from said gateway functionality to delivery functionalities.
24. The apparatus according to claim 12, wherein said communication networks are global system for mobile communication networks and said subscriber database is a home location register.
25. The apparatus according to claim 21, wherein said communication networks are global system for mobile communication networks and said gateway functionalities are gateway mobile switching centers.
26. The apparatus according to claim 12, wherein said communication networks are third generation mobile communication networks.
27. The apparatus according to claim 12, wherein said communication networks are packet switched communication networks.
28. The apparatus according to claim 27, wherein said packet switched communication networks are internet protocol based communication networks.
29. The apparatus according to claim 27, wherein said gateway functionalities are call state control functionalities.
30. The apparatus according to claim 12, wherein said subscriber database is a home subscriber server.
US10/495,861 2001-12-21 2001-12-21 Intercepting a call connection to a mobile subscriber roaming in a visited PLMN (VPLMN) Expired - Fee Related US7565146B2 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/EP2001/015246 WO2003055249A1 (en) 2001-12-21 2001-12-21 Intercepting a call connection to a mobile subscriber roaming in a visited plmn (vplmn)

Publications (2)

Publication Number Publication Date
US20050027866A1 US20050027866A1 (en) 2005-02-03
US7565146B2 true US7565146B2 (en) 2009-07-21

Family

ID=8164749

Family Applications (1)

Application Number Title Priority Date Filing Date
US10/495,861 Expired - Fee Related US7565146B2 (en) 2001-12-21 2001-12-21 Intercepting a call connection to a mobile subscriber roaming in a visited PLMN (VPLMN)

Country Status (5)

Country Link
US (1) US7565146B2 (en)
EP (1) EP1457074A1 (en)
CN (2) CN101222733B (en)
AU (1) AU2002228018A1 (en)
WO (1) WO2003055249A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100246447A1 (en) * 2007-10-04 2010-09-30 Klaus Hoffmann Method and device for processing data and communication system comprising such device
US20120250584A1 (en) * 2011-03-31 2012-10-04 Jayaraman Venkata Subramanian System and method for lawful interception in voice call continuity for telecommunication networks

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
RU2005127597A (en) * 2003-02-04 2006-03-20 Сименс Акциенгезелльшафт (DE) METHOD FOR INTERCEPTING A CONTENTED CALL FOR A COMMUNICATION NETWORK
CN100370870C (en) * 2003-12-31 2008-02-20 华为技术有限公司 A method for obtaining information in different public land mobile networks and system therefor
GB2422271A (en) * 2005-01-12 2006-07-19 Intellprop Ltd Telecommunications services apparatus and method for processing of voice calls
WO2007073252A1 (en) * 2005-12-22 2007-06-28 Telefonaktiebolaget Lm Ericsson (Publ) Provisioning of user information
CN100488284C (en) * 2006-01-26 2009-05-13 华为技术有限公司 Roaming user data route optimizing method in 3GPP evolution network
WO2007097667A1 (en) * 2006-02-27 2007-08-30 Telefonaktiebolaget Lm Ericsson Lawful access; stored data handover enhanced architecture
US8327024B2 (en) * 2006-04-29 2012-12-04 724 Solutions Software, Inc. System and method for SMS/IP interoperability
US8862095B2 (en) 2007-06-19 2014-10-14 Cisco Technology, Inc. Managing mobile nodes in a lawful intercept architecture
RU2453050C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method of conducting personal communication session between data network users and telephone network user (versions)
RU2453062C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method for personal transmission of information between data network users
RU2453059C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method for personal transmission of information between data network users
RU2453048C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method of conducting personal communication session between data network users
RU2453060C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method for personal transmission of information between data network users
RU2453049C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method of conducting personal communication session between data network users
RU2453052C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method for personal transmission of information between data network users
RU2467490C2 (en) * 2007-08-17 2012-11-20 Александр Степанович Ракушин Method for personal transmission of information between data network users
RU2467488C2 (en) * 2007-08-17 2012-11-20 Александр Степанович Ракушин Method for personal transmission of information between data network users
RU2453047C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method of conducting personal communication session between data network users
RU2453057C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method for personal transmission of information between data network users
RU2453063C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method for personal transmission of information between data network users
RU2467487C2 (en) * 2007-08-17 2012-11-20 Александр Степанович Ракушин Method for personal transmission of information between data network users
RU2453055C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method for personal transmission of information between data network users
RU2453065C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method for personal call of telephone network user
RU2453056C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method for personal transmission of information between data network users
RU2453058C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method for personal transmission of information between data network users
RU2453064C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method for personal transmission of information between data network users
RU2453053C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method of conducting personal communication session between telecommunication network users
RU2453045C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method of conducting personal communication session between data network users
RU2467489C2 (en) * 2007-08-17 2012-11-20 Александр Степанович Ракушин Method for personal transmission of information between data network users
RU2453061C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method for personal transmission of information between data network users
RU2453039C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method of conducting personal communication session between data network users
RU2453054C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method of conducting personal communication session between telecommunication network users
RU2453046C2 (en) * 2007-08-17 2012-06-10 Александр Степанович Ракушин Method of conducting personal communication session between data network users
KR100991364B1 (en) 2008-02-15 2010-11-02 (주)제너시스템즈 Method and apparatus of lawful interception using media information
WO2009124579A1 (en) * 2008-04-07 2009-10-15 Telefonaktiebolaget Lm Ericsson (Publ) Use of unique references to facilitate correlation of data retention or lawful interception records
US8260258B1 (en) 2008-05-13 2012-09-04 Cellco Partnership Method of target provisioning for lawful intercept in IP multi-media service networks
ES2400166T3 (en) 2008-10-20 2013-04-08 Koninklijke Kpn N.V. Protection of services in a mobile network against impersonation of CLI
CN102487519B (en) * 2010-12-02 2015-09-16 中兴通讯股份有限公司 Media content monitor method and device in IP Multimedia System
US9450752B2 (en) * 2011-04-29 2016-09-20 Nokia Technologies Oy Method and apparatus for providing service provider-controlled communication security
US9253630B2 (en) 2011-06-02 2016-02-02 Truphone Limited Identity management for mobile devices
US9603006B2 (en) 2011-09-19 2017-03-21 Truphone Limited Managing mobile device identities
GB2496598B (en) * 2011-11-14 2014-01-01 Truphone Ltd Call recording in a telecommunications network
US11202192B2 (en) 2017-08-21 2021-12-14 Nokia Technologies Oy Registering user equipment with a visited public land mobile network

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998036548A2 (en) 1997-02-13 1998-08-20 Siemens Aktiengesellschaft Method for controlling legal monitoring of telecommunications
WO2000028773A2 (en) 1998-11-05 2000-05-18 Adc Newnet, Inc. System for interception of wireless communications
US6122499A (en) * 1998-07-31 2000-09-19 Iridium, L.L.C. System and/or method for call intercept capability in a global mobile satellite communications system
US6131032A (en) * 1997-12-01 2000-10-10 Motorola, Inc. Method and apparatus for monitoring users of a communications system
WO2000076189A1 (en) 1999-06-08 2000-12-14 Telefonaktiebolaget Lm Ericsson (Publ) Automatic monitoring service for telecommunication networks
US20020049913A1 (en) * 1999-03-12 2002-04-25 Martti Lumme Interception system and method
US20020051457A1 (en) * 1999-03-12 2002-05-02 Jaana Eloranta Interception system and method
US6405030B1 (en) * 1999-05-20 2002-06-11 Peter Suprunov System for interception of digital cellular phone communication
US20020078384A1 (en) * 1999-01-14 2002-06-20 Lassi Hippelainen Interception method and system
US6871070B2 (en) * 2001-07-31 2005-03-22 Lucent Technologies Inc. Communication system for providing roaming between an internet protocol multimedia system and a circuit-switched domain
US20050063544A1 (en) * 2001-12-07 2005-03-24 Ilkka Uusitalo Lawful interception of end-to-end encrypted data traffic
US6922466B1 (en) * 2001-03-05 2005-07-26 Verizon Corporate Services Group Inc. System and method for assessing a call center
US7116786B2 (en) * 2001-09-10 2006-10-03 Motorola, Inc. Interception of secure data in a mobile network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5566357A (en) * 1994-10-06 1996-10-15 Qualcomm Incorporated Power reduction in a cellular radiotelephone
US5892811A (en) * 1995-12-04 1999-04-06 Motorola, Inc. Radio telecommunication network and method for unobtrusive call interception via transcoder bypass

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998036548A2 (en) 1997-02-13 1998-08-20 Siemens Aktiengesellschaft Method for controlling legal monitoring of telecommunications
US6131032A (en) * 1997-12-01 2000-10-10 Motorola, Inc. Method and apparatus for monitoring users of a communications system
US6122499A (en) * 1998-07-31 2000-09-19 Iridium, L.L.C. System and/or method for call intercept capability in a global mobile satellite communications system
US6577865B2 (en) * 1998-11-05 2003-06-10 Ulysses Holdings, Llc System for intercept of wireless communications
WO2000028773A2 (en) 1998-11-05 2000-05-18 Adc Newnet, Inc. System for interception of wireless communications
US20020078384A1 (en) * 1999-01-14 2002-06-20 Lassi Hippelainen Interception method and system
US20020049913A1 (en) * 1999-03-12 2002-04-25 Martti Lumme Interception system and method
US20020051457A1 (en) * 1999-03-12 2002-05-02 Jaana Eloranta Interception system and method
US6405030B1 (en) * 1999-05-20 2002-06-11 Peter Suprunov System for interception of digital cellular phone communication
WO2000076189A1 (en) 1999-06-08 2000-12-14 Telefonaktiebolaget Lm Ericsson (Publ) Automatic monitoring service for telecommunication networks
US6922466B1 (en) * 2001-03-05 2005-07-26 Verizon Corporate Services Group Inc. System and method for assessing a call center
US6871070B2 (en) * 2001-07-31 2005-03-22 Lucent Technologies Inc. Communication system for providing roaming between an internet protocol multimedia system and a circuit-switched domain
US7116786B2 (en) * 2001-09-10 2006-10-03 Motorola, Inc. Interception of secure data in a mobile network
US20050063544A1 (en) * 2001-12-07 2005-03-24 Ilkka Uusitalo Lawful interception of end-to-end encrypted data traffic

Non-Patent Citations (7)

* Cited by examiner, † Cited by third party
Title
3GPP TS 23.002 V5.4.0 (Oct. 2001); 3r Generation Partnership Project; Technical Specification Group Services and Systems Aspects; Network Architecture (Release 5); pp. 1-48.
3GPP TS 23.228 V5.2.0 (Oct. 2001); 3r Generation Partnership Project; Technical Specification Group Services and System Aspects; IP Multimedia Subsystem (IMS); Stage 2 (Release 5); pp. 1-123.
3GPP TS 33.107 V3.1.0 (Dec. 2000); 3r Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Lawful Interception Architecture and Functions (Release 1999); pp. 1-55.
Communication from the European Patent Office (Summons to Attend Oral Proceedings), for EP Application No. 01989614.1, Dec. 7, 2006.
D4: M. Mouly and M.B. Pautet,-XP-002103158, "the GSM System for Mobile Communications" "8.Communication Management", 1992, pp. 501-565.
ETSI TS 101 629 V7.0.0, Digital Cellular Telecommunications System (Phase 2+); Support of Optimal Routeing (SOR); Service Definition (Stage 1) (GSM 02.79 version 7.0.0 Release 1998), Aug. 1999, pp. 1-16.
Miettinen, Kari "Lawful Interception in GPRS/UMTS Network" May 7, 1999, Department of Computer Science, University of Helsinki; pp. 1-20.

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100246447A1 (en) * 2007-10-04 2010-09-30 Klaus Hoffmann Method and device for processing data and communication system comprising such device
US20120250584A1 (en) * 2011-03-31 2012-10-04 Jayaraman Venkata Subramanian System and method for lawful interception in voice call continuity for telecommunication networks
US8553588B2 (en) * 2011-03-31 2013-10-08 Wipro Limited System and method for lawful interception in voice call continuity for telecommunication networks

Also Published As

Publication number Publication date
CN101222733A (en) 2008-07-16
CN100366114C (en) 2008-01-30
US20050027866A1 (en) 2005-02-03
EP1457074A1 (en) 2004-09-15
WO2003055249A1 (en) 2003-07-03
CN1582594A (en) 2005-02-16
AU2002228018A1 (en) 2003-07-09
CN101222733B (en) 2010-12-22

Similar Documents

Publication Publication Date Title
US7565146B2 (en) Intercepting a call connection to a mobile subscriber roaming in a visited PLMN (VPLMN)
US8725141B2 (en) Method of providing access to an IP multimedia subsystem
US9374455B2 (en) Systems and methods for providing emergency callback procedures
EP1523827B1 (en) Informing a lawful interception system of the serving system serving an intercepted target
US6754834B2 (en) Technique for generating correlation number for use in lawful interception of telecommunications traffic
US8626157B2 (en) Methods, systems, and computer readable media for dynamic subscriber profile adaptation
EP1878283B1 (en) Method for providing a location information service in mobile communications system, and corresponding communication system
US8131459B2 (en) Method for the determination of a receiver for location information
US9241256B2 (en) Transmission and distribution of position- and/or network-related information from access networks
US7054615B2 (en) System and method for providing enhanced user privacy in a mobile communications network
EP1715626B1 (en) A method for processing the request of position information from a user equipment
EP1649708B1 (en) A method and system for including location information in a ussd message by a network node
CN110324819A (en) The management method and management server of vice card terminal
WO2011080638A1 (en) Illegal carrier detection platform and method
US20060172744A1 (en) Method and system for subscriber integrity in a mobile communications system
WO2003037026A1 (en) System and method for the positioning of a subscriber during an emergency call performed by a mobile phone without a valid sim card
US20050124356A1 (en) Method and telecommunications system for positioning a target user equipment using a mobile originating-location request procedure
US20090305719A1 (en) Provision of location information into iri
WO2023170332A1 (en) Automated fraud call detection
NZ553728A (en) Method of providing access to an IP multimedia subsystem

Legal Events

Date Code Title Description
AS Assignment

Owner name: NOKIA CORPORATION, FINLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:SEURUJARVI, JORMA;LAURILA, ANTTI;KARKI, URPO;REEL/FRAME:016232/0915;SIGNING DATES FROM 20040505 TO 20040506

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: NOKIA TECHNOLOGIES OY, FINLAND

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:NOKIA CORPORATION;REEL/FRAME:035602/0280

Effective date: 20150116

FPAY Fee payment

Year of fee payment: 8

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20210721